Statistical higher-order correlation attacks against code-based masking

W Cheng, J Ming, S Guilley… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Masking is one of the most well-established methods to thwart side-channel attacks. Many
masking schemes have been proposed in the literature, and code-based masking emerges …

Circuit masking: from theory to standardization, a comprehensive survey for hardware security researchers and practitioners

A Covic, F Ganji, D Forte - arXiv preprint arXiv:2106.12714, 2021 - arxiv.org
Side-channel attacks extracting sensitive data from implementations have been considered
a major threat to the security of cryptographic schemes. This has elevated the need for …

Polynomial sharings on two secrets: Buy one, get one free

P Arnold, S Berndt, T Eisenbarth… - IACR Transactions on …, 2024 - philosophymindscience.org
While passive side-channel attacks and active fault attacks have been studied intensively in
the last few decades, strong attackers combining these attacks have only been studied …

Information leakages in code-based masking: A unified quantification approach

W Cheng, S Guilley, C Carlet, JL Danger… - Cryptology ePrint …, 2021 - eprint.iacr.org
This paper presents a unified approach to quantifying the information leakages in the most
general code-based masking schemes. Specifically, by utilizing a uniform representation …

On efficient and secure code-based masking: A pragmatic evaluation

Q Wu, W Cheng, S Guilley, F Zhang… - IACR Transactions on …, 2022 - tches.iacr.org
Code-based masking is a highly generalized type of masking schemes, which can be
instantiated into specific cases by assigning different encoders. It captivates by its side …

Information leakage in code-based masking: A systematic evaluation by higher-order attacks

W Cheng, S Guilley, JL Danger - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Code-based masking is a recent line of research on masking schemes aiming at provably
counteracting side-channel attacks. It generalizes and unifies many masking schemes within …

Generalized feistel ciphers for efficient prime field masking-full version

L Grassi, L Masure, P Méaux, T Moos… - Cryptology ePrint …, 2024 - eprint.iacr.org
A recent work from Eurocrypt 2023 suggests that prime-field masking has excellent potential
to improve the efficiency vs. security tradeoff of masked implementations against side …

Optimizing higher-order correlation analysis against inner product masking scheme

J Ming, Y Zhou, W Cheng, H Li - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
In recent years, inner product masking (IPM) has been proposed as a promising code based
masking scheme against side-channel attacks. However, most studies mainly focus on …

Generalized Feistel Ciphers for Efficient Prime Field Masking

L Grassi, L Masure, P Méaux, T Moos… - … Conference on the …, 2024 - Springer
A recent work from Eurocrypt 2023 suggests that prime-field masking has excellent potential
to improve the efficiency vs. security tradeoff of masked implementations against side …

Redundant code-based masking revisited

N Costes, M Stam - IACR Transactions on Cryptographic Hardware …, 2021 - tches.iacr.org
Masking schemes are a popular countermeasure against side-channel attacks. To mask
bytes, the two classical options are Boolean masking and polynomial masking. The latter …